Search
Support the Blog — Buy This Book!
For Kindle and with free ePub version. Only $9.49 Great reading. Here is what Gary Shapiro CEO of the Consumer Electronics Association (CEA) said: Dvorak's writing sings with insight and clarity. Whether or not you agree with John's views, he will get you thinking and is never boring. These essays are worth the read!Twitter action
Support the Blog
Put this ad on your blog!
Syndicate
Junk Email Filter
Categories
- Animals
- Art
- Aviation
- Beer
- Business
- cars
- Children
- Column fodder
- computers
- Conspiracy Theory
- Cool Stuff
- Cranky Geeks
- crime
- Dirty Politics
- Disaster Porn
- DIY
- Douchebag
- Dvorak-Horowitz Podcast
- Ecology
- economy
- Endless War
- Extraterrestrial
- Fashion
- FeaturedVideo
- food
- FUD
- Games
- General
- General Douchery
- Global Warming
- government
- Guns
- Health Care
- Hobbies
- Human Rights
- humor
- Immigration
- international
- internet
- Internet Privacy
- Kids
- legal
- Lost Columns Archive
- media
- medical
- military
- Movies
- music
- Nanny State
- NEW WORLD ORDER
- no agenda
- OTR
- Phones
- Photography
- Police State
- Politics
- Racism
- Recipe Nook
- religion
- Research
- Reviews
- Scams
- school
- science
- Security
- Show Biz
- Society
- software
- space
- sports
- strange
- Stupid
- Swamp Gas Sightings
- Taxes
- tech
- Technology
- television
- Terrorism
- The Internet
- travel
- Video
- video games
- War on Drugs
- Whatever happened to..
- Whistling through the Graveyard
- WTF!
Pages
- (Press Release): Comes Versus Microsoft
- A Post of the Infamous “Dvorak” Video
- All Dvorak Uncensored special posting Logos
- An Audit by Another Name: An Insiders Look at Microsoft’s SAM Engagement Program
- Another Slide Show Test — Internal use
- Apple Press Photos Collection circa 1976-1985
- April Fool’s 2008
- April Fool’s 2008 redux
- Archives of Special Reports, Essays and Older Material
- Avis Coupon Codes
- Best of the Videos on Dvorak Uncensored — August 2005
- Best Videos of Dvorak Uncensored Dec. 2006
- Best Videos of Dvorak Uncensored July 2007
- Best Videos of Dvorak Uncensored Nov. 2006
- Best Videos of Dvorak Uncensored Oct. 2006
- Best Videos of Dvorak Uncensored Sept. 2006
- Budget Rental Coupons
- Commercial of the day
- Consolidated List of Video Posting services
- Contact
- Develping a Grading System for Digital Cameras
- Dvorak Uncensored LOGO Redesign Contest
- eHarmony promotional code
- Forbes Knuckles Under to Political Correctness? The Real Story Here.
- Gadget Sites
- GoDaddy promo code
- Gregg on YouTube
- Hi Tech Christmas Gift Ideas from Dvorak Uncensored
- IBM and the Seven Dwarfs — Dwarf Five: GE
- IBM and the Seven Dwarfs — Dwarf Four: Honeywell
- IBM and the Seven Dwarfs — Dwarf One: Burroughs
- IBM and the Seven Dwarfs — Dwarf Seven: NCR
- IBM and the Seven Dwarfs — Dwarf Six: RCA
- IBM and the Seven Dwarfs — Dwarf Three: Control-Data
- IBM and the Seven Dwarfs — Dwarf Two: Sperry-Rand
- Important Wash State Cams
- LifeLock Promo Code
- Mexican Take Over Vids (archive)
- NASDAQ Podium
- No Agenda Mailing List Signup Here
- Oracle CEO Ellison’s Yacht at Tradeshow
- Quiz of the Week Answer…Goebbels, Kind of.
- Real Chicken Fricassee Recipe
- Restaurant Figueira Rubaiyat — Sao Paulo, Brasil
- silverlight test 1
- Slingbox 1
- Squarespace Coupon
- TEST 2 photos
- test of audio player
- test of Brightcove player 2
- Test of photo slide show
- test of stock quote script
- test page reuters
- test photo
- The Fairness Doctrine Page
- The GNU GPL and the American Way
- The RFID Page of Links
- translation test
- Whatever Happened to APL?
- Whatever Happened to Bubble Memory?
- Whatever Happened to CBASIC?
- Whatever Happened to Compact Disc Interactive (aka CDi)?
- Whatever Happened to Context MBA?
- Whatever Happened to Eliza?
- Whatever Happened to IBM’s TopView?
- Whatever Happened to Lotus Jazz?
- Whatever Happened to MSX Computers?
- Whatever Happened to NewWord?
- Whatever Happened to Prolog?
- Whatever Happened to the Apple III?
- Whatever Happened to the Apple Lisa?
- Whatever Happened to the First Personal Computer?
- Whatever Happened to the Gavilan Mobile Computer?
- Whatever Happened to the IBM “Stretch” Computer?
- Whatever Happened to the Intel iAPX432?
- Whatever Happened to the Texas Instruments Home Computer?
- Whatever Happened to Topview?
- Whatever Happened to Wordstar?
- Wolfram Alpha Can Create Nifty Reports
ISPs could stop more than one IP number (or designated machine address) from accessing a DSL port, essentially killing all unauthorized access. You wouldn’t even need a password or WiFi encryption.
@sargasso not if i am running a nat service.
stupid lady
Is it stealing if they are stupid enough to broadcast it unencrypted?
@sargasso – How can the isp block a MAC when it’s hiding behind a NAT?
@sargasso
They tried, but NAT, DHCP and Mac Address Cloning in every consumer broadband router available made that incremental revenue generating pipe dream just that, a pipe dream.
Give Leo a call on his “Tech Guy” show and I’m sure he can explain it to you.
#1 – sargasso
It doesn’t work that way. A router is usually just hooked up to one DSL connection. In other words, it’s one IP address. Blocking of unauthorized users must be done at the router.
#3 – McCullough – Is it stealing if they are stupid enough to broadcast it unencrypted?
Is it okay to take your neighbors’ car for a joyride if he forgot the keys in the car?
#3 McCullough – Depends, it is stealing if you swipe an apple or wiper fluid from a stand outside the grocery store? 🙂
Its funny, the lady had enough smarts to call Leo, yet seems clueless…was she?? It is rather funny.
#7. Now there is a case of Apples and Oranges.
#1 – sargasso
So only one one person can use it?
What about wife, kids, roommates, etc.
Plus a router with nat takes care of it.
Hey sargasso, did you get the memo?
This is why I can’t stand doing consumer level tech support. People armed with *just* enough information to be dangerous, but not enough to 1) understand what they’re doing, and 2) not enough interest to fill in the gaps. I mean, you can just feel the caller NOT listening to Leo’s explanations. The matches striking but not lighting. Makes my colon clench! Maybe it was a planted Shark Tank call, in those cases you have to play the BOFH and advise something like “Caller, you should call the police and let them know what’s happening. Someone may be hurt or dying”. Hello, I’d like to report a missing router!
Who is this Leo Laporte they mentioned, is that the lady who is calling?
Mom?
#13 you’re kidding right?
Best ever? not so much.
I liked the person who scanned a mirror so they could use it as a screen background and couldn’t figure out why the monitor didn’t reflect their image.
I do agree that “they” charge too much for all this bandwidth. Not the DSL guys at $14.95/mo, I’m talking about the cable guys. She has too much self-esteem to pay for DSL, even if it is affordable. If you’re gonna steal, steal from the best!
Leo.. douchbag!
It’s rather sad that this lady is totally clueless with WiFi and her computer. But before you judge, consider the following:
* Possession, sale and/or consumption of marijuana is ILLEGAL! (According to FEDERAL statutes, that is.)
* Speeding on many public streets is ILLEGAL!
* Polluting is ILLEGAL! (Such as throwing trash on/over the ground.)
* Smoking in many (USA) public building areas is ILLEGAL!
* Carrying concealed firearms is ILLEGAL! (Without a permit/license, that is.)
* Selling a used toilet is ILLEGAL!
* Recording cellular phone calls without a warrant or either parties knowledge is ILLEGAL!
* Downloading music which you don’t have license to listen to is ILLEGAL!
* Intercepting cable services (stealing cable TV) is ILLEGAL!
Shall I go on?
Point is, how often do you see these illegal acts or maybe even have committed them yourself?! True, that woman is rather clueless where WiFi is concerned but she’s hardly alone in here ignorance either. Most of us here probably know better and probably find it amusing that anyone in the “digital age” could be so stupid. But lest ye not judge…
(I wonder how many of you didn’t know that selling a used toilet really is illegal!)
@1 sargasso
You’re as clueless as the lady who spoke with Leo on this video. Your broadband ISP only assigns you ONE single IP ANYWAY.
#17 George_nl
Hardly a douche. If I was taking that call I’d humiliate her and make her feel stupid, that would make me a douchebag. Leo is professional and deals with idiots on a regular basis, and was polite with her; which makes him a NICE guy.. not a douche bag.
She’s a borrow and spend Republican. She borrows the bandwidth but spent money to buy a devise to borrow more bandwidth.
bet the bitch voted for obama and thinks his healthcare plan will save her money too.
People like this are out there everywhere. It is scary.
A friend asked me to stop by her mother’s house to “fix” her broadband. The mom had been sold an expensive Verizon roaming wireless data package when what she wanted was cable internet at home on a desktop computer. She was upset cause (a) it was expensive, (b) it didn’t work. I was ticked off at the salesman who sold it to her. I know he knew better.
Another friend just got Verizon FiOS last week. I stopped by and just for fun checked out the router Verizon installed. Yup… Verizon configured WEP encryption (worthless), and left UPnP on for external access. I have to wonder if the FBI and NSA are paying Verizon to compromise their installs.
#8 – You analogy is incorrect. Using someones open WiFi is not like swipe an apple or wiper fluid from a stand outside the grocery store.
It is like taking junk that someone puts outside with a sign on it that says “Free”.
To use someone’s open WiFi your computer asks their router for permission to connect and their router grants it. This is the way the owner of the WiFi has it setup regardless if that is what they intended or not. It is not stealing when permission to take something has been ask and granted.
If you “hack” someones WiFi that has been protected with any encryption then you are stealing it.
#22
Correct me if I’m wrong but UPnP can’t be configured by “external” access. Unless you mean within the LAN it self (wireless) but not from the WAN internet side. It’s not really a bad thing it’s damn useful for hassle free configs.
Then once you see what the settings are for apps/hardware that used UPnP, you can then turn off UPnP and set your ports manually your self!
#23 I think you meant to respond to #3
Anyway no. Just because someone’s WiFi access is open and unencrypted doesn’t mean they are doing so willingly.
If a router still has it’s DEFAULT SSID then you can be sure you’re dealing with someone who is clueless about home networking. That still doesn’t grant you the right to steal their bandwidth.
Now if you DO find a router that has it’s SSID renamed and isn’t encrypted, you can only imply they are offering it for free. Unless the SSID says “FREE_WIFI” on it then by all means.. go apeshit!
It’s just another staged call. People are not really that stupid. They have to set those calls up to make people sound stupid. Don’t they ?
For those that like to use the car/home analogy to defend this is illegal…
You buy a car or home and the locks are unlocked by default and the security system is deactivated. You need to lock the car yourself and set the code for the alarm system.
Most know how to lock a car (at least most here on DU) and most will figure out how to enter the code for the home alarm (“1234”).
People need to wake up to risks of computing whether it is their wifi setup or falling for scams.
Why the f..k should I get arrested for using an open WIFI somebody forgot to encrypt? If it’s open it means anybody can get on it.
Otherwise have brains and seal it you morans.
And Sidney Crosby rules. Just sayin’.
P.S. Iggy’s pretty awesome too.
@FRAGaLOT #19
I agree and kudos to Leo for having the patience to deal with these calls. He is the consummate professional.